Date: Sun, 28 Oct 2001 09:07:03 -0500 (EST) From: Robert Watson <rwatson@FreeBSD.org> To: FUJISHIMA Satsuki <sf@FreeBSD.org> Cc: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: ports/x11/XFree86-4-clients Makefile ports/x11/XFree86-4-libraries/files patch-xdm_session.c Message-ID: <Pine.NEB.3.96L.1011028090507.15623A-100000@fledge.watson.org> In-Reply-To: <200110280241.f9S2f5M68453@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
I've always liked the idea of -nolisten tcp by default, but could you verify that SSH X11 forwarding still works when this is the case? It was my impression, at one point, that the X11 forwarding was effectively a glorified TCP forwarding, and not capable of forwarding the remote TCP X11 connection to the local UNIX domain socket in /tmp. What I'd really like is a way to limit TCP connections to localhost; since we already use cookies by default, that should probably an equivilent degree of protection. Robert N M Watson FreeBSD Core Team, TrustedBSD Project robert@fledge.watson.org NAI Labs, Safeport Network Services On Sat, 27 Oct 2001, FUJISHIMA Satsuki wrote: > sf 2001/10/27 19:41:05 PDT > > Modified files: > x11/XFree86-4-clients Makefile > Added files: > x11/XFree86-4-libraries/files patch-xdm_session.c > Log: > o sync with x11/XFree86-4 > - startx -nolisten tcp by default. > - set login.conf environment for xdm. > > Revision Changes Path > 1.91 +2 -1 ports/x11/XFree86-4-clients/Makefile > 1.1 +27 -0 ports/x11/XFree86-4-libraries/files/patch-xdm_session.c (new) > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1011028090507.15623A-100000>